USM is a secrets manager designed to offer a secure and user-friendly solution for managing your digital data across multiple platforms, featuring modern encryption, making it an ideal tool for both personal and professional use.
It is written in Go and uses Fyne as UI toolkit and age as encryption library.
This software is work in progress, and didn't went through a full security audit.
Do not expect it to be bug free and do not rely on it for any type of security.
- Cross platform application (linux, macOS, Windows, BSD ...) with a single codebase
- Desktop, Mobile and CLI application with a single binary
- Minimal direct dependencies
- Agent to handle SSH keys and CLI sessions
- Open source: code can be audited
- Audit passwords against data breaches
- TOTP support
- Password import/export
- Syncronization across instances
- Web application (however, this is highly debatable)
- Passwords management and generation enhancements
To try the development version or help with testing:
git clone https://github.com/source-c/usm.git usm-go
cd usm-go
make help
make clean && make generate-mocks && make check && make build
make generate-integrations
- Configuration Management - Versioned configuration system using Viracochan
- Desktop Integrations - Desktop integration file generation for Linux and macOS
One or more vaults can be initialized to store secrets and identities.
When the vault is initialized user will be prompt for a vault name and password. An age key is generated and it is encrypted using an age Scrypt recipient with the provided password and saved on disk (key.age) The X25519 identity and its recipient from the key file are used to decrypt and encrypt the vault data. Each item is stored separately on disk so that the content can be decrypted manually using the age tool, if needed. All the items' metadata are encrypted and stored into the vault.age file so that no information is in clear text.
Random password are derived reading byte-by-byte the block of randomness from a HKDF cryptographic key derivation function that uses the age key as secret. Printable characters that match the desired password rule (uppercase, lowercase, symbols and digits) are then included in the generated password.
Where a generated password is not applicable a custom password can be specified.
Vault internally is organized hierarchically like:
- vault
├── login
| └── www.example.com
| └── my.site.com
├── password
| └── mypassword
└── note
└── mysecretnote
where login, password and note are the USM items, see the dedicated section for details.
Items are special templates aim to help the identity management.
Currently, the following items are available:
- login
- note
- password
- ssh_key
The threat model of USM assumes there are no attackers on your local machine.
Contributions are welcome! Please feel free to submit a Pull Request.
- age for the encryption library
- Fyne for the UI toolkit
- Tabler icons for the icons
Thanks to these Open Source password managers that inspired the USM project:
This project was originally heavily inspired by Paw by Luca Corbo, but has since evolved into USM with a distinct architecture, UX and branding.
MIT License only - meaning you are only the one who decides what to do next. There is no intention to make this project anyhow commercial.